<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>DeFi risk Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/defi-risk/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/defi-risk/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Sun, 07 Dec 2025 11:24:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>DeFi risk Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/defi-risk/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Jupiter (JUP) Lend Risk Debate Sparks Solana Concerns</title>
		<link>https://coinengineer.net/blog/jupiter-jup-lend-risk-debate-sparks-solana-concerns/</link>
					<comments>https://coinengineer.net/blog/jupiter-jup-lend-risk-debate-sparks-solana-concerns/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Sun, 07 Dec 2025 13:00:43 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Blockchain News]]></category>
		<category><![CDATA[Crypto Lending]]></category>
		<category><![CDATA[DeFi risk]]></category>
		<category><![CDATA[fund safety]]></category>
		<category><![CDATA[Jupiter Lend]]></category>
		<category><![CDATA[Liquidity Management]]></category>
		<category><![CDATA[solana]]></category>
		<category><![CDATA[solana lending]]></category>
		<category><![CDATA[user funds]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=58849</guid>

					<description><![CDATA[<p>Jupiter (JUP) Exchange’s lending products on Solana have sparked debate over the safety of user funds. The community believed investments were fully separate and secure. However, the company’s acknowledgment that some funds are used in other operations to generate yield has shaken trust. Dhanda and Jain’s Statements Jupiter COO Kash Dhanda admitted that social media</p>
<p>The post <a href="https://coinengineer.net/blog/jupiter-jup-lend-risk-debate-sparks-solana-concerns/">Jupiter (JUP) Lend Risk Debate Sparks Solana Concerns</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="224" data-end="514"><strong>Jupiter</strong> (<a href="https://coinengineer.net/blog/jupiter-130-million-jup-token-burn-approved/"><strong>JUP</strong></a>) Exchange’s lending products on <strong>Solana</strong> have sparked debate over the safety of user funds. The community believed investments were fully separate and secure. However, the company’s acknowledgment that some funds are used in other operations to generate yield has shaken trust.</p>
<p data-start="516" data-end="550"><strong data-start="516" data-end="548">Dhanda and Jain’s Statements</strong></p>
<p data-start="552" data-end="648">Jupiter COO Kash Dhanda admitted that social media posts claiming “zero risk” were inaccurate.</p>
<blockquote>
<p data-start="650" data-end="815">Dhanda said, “We said there was zero risk on social media, which wasn’t entirely correct. We deleted the post, but we should have issued a correction immediately.”</p>
</blockquote>
<p data-start="817" data-end="1196">He also explained that the vaults are managed with their own rules, and a portion of the investments can be used in other operations. Fluid co-founder Samyak Jain confirmed that user funds are not completely separate but noted that each vault has its own limits, collateral ratios, and penalty rules. This ensures some level of protection but invalidates full isolation claims.</p>
<h2 data-start="1198" data-end="1242">Rival Criticism and Community Concerns</h2>
<p data-start="1244" data-end="1493">Kamino co-founder Marius Ciubotariu criticized Jupiter Lend’s structure. On X, he wrote, “If you deposit SOL and borrow USDC, your SOL gets used in other positions. All the risk falls on you. There’s no isolation; risk spreads across investments.”</p>
<p data-start="1495" data-end="1759">Ciubotariu also emphasized that “using the term ‘isolated’ this way is misleading,” noting that rehypothecation nullifies any isolation claims. Kamino blocked certain Jupiter tools to prevent misleading users and requested the migration tool to be fully two-way.</p>
<p data-start="1761" data-end="1870"><em data-start="1761" data-end="1868">(Rehypothecation means deposited collateral or assets can be reused by the platform in other operations.)</em></p>
<p data-start="1872" data-end="2034">An industry insider anonymously commented, “Claiming isolation while using funds elsewhere is a breach of trust.” This view reflects growing community concerns.</p>
<p data-start="2036" data-end="2056"><strong data-start="2036" data-end="2054">Key Takeaways:</strong></p>
<ul data-start="2058" data-end="2297">
<li data-start="2058" data-end="2103">
<p data-start="2060" data-end="2103">Some funds are reused in other operations</p>
</li>
<li data-start="2104" data-end="2144">
<p data-start="2106" data-end="2144">Risk can spread to other investments</p>
</li>
<li data-start="2145" data-end="2192">
<p data-start="2147" data-end="2192">Users may not fully understand the exposure</p>
</li>
<li data-start="2193" data-end="2234">
<p data-start="2195" data-end="2234">Deleting previous posts reduced trust</p>
</li>
<li data-start="2235" data-end="2297">
<p data-start="2237" data-end="2297">Rival and industry warnings highlight potential violations</p>
</li>
</ul>
<h2 data-start="2299" data-end="2339">Performance, TVL, and Future Plans</h2>
<p data-start="2341" data-end="2587">Jupiter Lend’s total value locked exceeds $1 billion. The protocol reported zero losses during the major market crash in October. Dhanda stated that each vault operates under its own rules and limits, generating yields through these mechanisms.</p>
<p data-start="2589" data-end="2829">Ciubotariu countered, “The platform was only live for one month with few positions. It requires years of testing to call it ‘safe.’” Jupiter Lend offers loan-to-value ratios up to 90% and uses a “custom liquidation engine” to manage risk.</p>
<p data-start="2831" data-end="3032">Jupiter plans to release additional documentation and an explanatory video after the Solana Breakpoint conference, aiming to increase user confidence and enhance security across the Solana ecosystem.</p>
<p data-start="2831" data-end="3032"><em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram, </a><a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</a>, and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</a> channels for the latest news and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/jupiter-jup-lend-risk-debate-sparks-solana-concerns/">Jupiter (JUP) Lend Risk Debate Sparks Solana Concerns</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/jupiter-jup-lend-risk-debate-sparks-solana-concerns/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/01/jupiter_ce.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/01/jupiter_ce.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>CoinDCX Suffers $44M Hack in Sophisticated Server Breach</title>
		<link>https://coinengineer.net/blog/coindcx-suffers-44m-hack-in-sophisticated-server-breach/</link>
					<comments>https://coinengineer.net/blog/coindcx-suffers-44m-hack-in-sophisticated-server-breach/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 20 Jul 2025 17:00:56 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[Exchange News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[$44 million loss]]></category>
		<category><![CDATA[Arcadia Finance]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[centralized exchanges]]></category>
		<category><![CDATA[CoinDCX]]></category>
		<category><![CDATA[CoinDCX breach]]></category>
		<category><![CDATA[Crypto Exchange Hack]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[Crypto Theft]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[DeFi risk]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[GMX V1 exploit]]></category>
		<category><![CDATA[investor safety]]></category>
		<category><![CDATA[Nobitex hack]]></category>
		<category><![CDATA[solana]]></category>
		<category><![CDATA[Sumit Gupta]]></category>
		<category><![CDATA[tornado cash]]></category>
		<category><![CDATA[WazirX hack]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=46480</guid>

					<description><![CDATA[<p>While crypto markets fluctuate daily, one constant remains—cybersecurity threats. India’s prominent crypto exchange CoinDCX has fallen victim to a major hack, reigniting fears around digital asset security. With $44 million stolen, the crypto world is once again reminded of its vulnerabilities. Attack Originated from Internal Liquidity Account According to CoinDCX CEO Sumit Gupta, the breach</p>
<p>The post <a href="https://coinengineer.net/blog/coindcx-suffers-44m-hack-in-sophisticated-server-breach/">CoinDCX Suffers $44M Hack in Sophisticated Server Breach</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="2945" data-end="3175">While crypto markets fluctuate daily, one constant remains—cybersecurity threats. India’s prominent crypto exchange <strong data-start="3081" data-end="3092">CoinDCX</strong> has fallen victim to a major hack, reigniting fears around digital asset security.</p>
<p data-start="3177" data-end="3265">With $44 million stolen, the crypto world is once again reminded of its vulnerabilities.</p>
<h2 data-start="3272" data-end="3558">Attack Originated from Internal Liquidity Account</h2>
<p data-start="3272" data-end="3558">According to CoinDCX CEO <strong data-start="3353" data-end="3368">Sumit Gupta</strong>, the breach stemmed from an internal account used for liquidity provision with another exchange. Hackers drained $44 million through what Gupta described as a “sophisticated server breach.”</p>
<blockquote>
<p data-start="3560" data-end="3717"><em>“No user funds were affected,” Gupta assured. “The compromised account was isolated swiftly, and the loss will be covered entirely by our treasury reserves.”</em></p>
</blockquote>
<h2 data-start="3724" data-end="3982">Funds Traced Across Chains</h2>
<p data-start="3724" data-end="3982">On-chain analyst ZachXBT traced the attacker’s wallet back to <strong data-start="3819" data-end="3835">Tornado Cash</strong>, where it was funded with 1 <strong data-start="3864" data-end="3876">Ethereum</strong>. The stolen funds were then partially bridged from <strong data-start="3928" data-end="3938">Solana</strong> to <strong data-start="3942" data-end="3954">Ethereum</strong>, making tracking difficult.</p>
<hr />
<p data-start="3984" data-end="4226"><em>You Might Be Interested In: <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://coinengineer.net/blog/sonic-svm-research-can-new-stablecoins-shake-up-the-old-order/">Sonic SVM Research: Can New Stablecoins Shake Up the Old Order?</a></span></em></p>
<hr />
<p data-start="3984" data-end="4226">The incident echoes a similar hack on <strong data-start="4022" data-end="4032">WazirX</strong>—another Indian exchange—exactly one year ago to the day, which resulted in a $235 million loss. Analysts see the timing as a grim reminder of persistent cybersecurity gaps in the crypto sector.</p>
<h2 data-start="4233" data-end="4269">Wave of Recent Crypto Exploits</h2>
<ul>
<li data-start="4272" data-end="4345"><strong data-start="4272" data-end="4283">Nobitex</strong> (Iran): $100 million stolen on June 18; source code leaked.</li>
<li data-start="4348" data-end="4425"><strong data-start="4348" data-end="4358">GMX V1</strong>: $40 million drained on July 9, later returned for a $5M bounty.</li>
<li data-start="4428" data-end="4497"><strong data-start="4428" data-end="4447">Arcadia Finance</strong>: $3.5 million lost due to smart contract exploit.</li>
</ul>
<p data-start="4499" data-end="4622">These repeated breaches stress the urgent need for better risk management in both centralized and decentralized ecosystems.</p>
<hr />
<p data-start="4499" data-end="4622"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <span style="color: #0000ff;"><a href="https://t.me/coinengineernews">Telegram</a><span style="color: #000000;">,</span> <a style="color: #0000ff;" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow">YouTube</a></span><span style="color: #000000;">,</span> and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><span style="color: #0000ff;">Twitter</span></a> channels for the latest<span style="color: #0000ff;"> <a style="color: #0000ff;" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a></span> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/coindcx-suffers-44m-hack-in-sophisticated-server-breach/">CoinDCX Suffers $44M Hack in Sophisticated Server Breach</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/coindcx-suffers-44m-hack-in-sophisticated-server-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/hack_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/hack_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Shock in the SUI Ecosystem: Alleged Vulnerability in Cetus Protocol Smart Contracts</title>
		<link>https://coinengineer.net/blog/shock-in-the-sui-ecosystem-alleged-vulnerability-in-cetus-protocol-smart-contracts/</link>
					<comments>https://coinengineer.net/blog/shock-in-the-sui-ecosystem-alleged-vulnerability-in-cetus-protocol-smart-contracts/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Thu, 22 May 2025 11:17:48 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[Cetus breach]]></category>
		<category><![CDATA[Cetus Coin]]></category>
		<category><![CDATA[CETUS drop]]></category>
		<category><![CDATA[Cetus official response]]></category>
		<category><![CDATA[Cetus Protocol]]></category>
		<category><![CDATA[Crypto Analysis]]></category>
		<category><![CDATA[Crypto Exploit]]></category>
		<category><![CDATA[Decentralized Exchange]]></category>
		<category><![CDATA[DeFi risk]]></category>
		<category><![CDATA[DEX security]]></category>
		<category><![CDATA[smart contract vulnerability]]></category>
		<category><![CDATA[sui]]></category>
		<category><![CDATA[SUI drop]]></category>
		<category><![CDATA[sui ecosystem]]></category>
		<category><![CDATA[SUI hack]]></category>
		<category><![CDATA[SUI protocol]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=42942</guid>

					<description><![CDATA[<p>The crypto world has once again been rattled by a security scare. This time, the focus is on Cetus Protocol, a decentralized exchange protocol operating within the SUI ecosystem. According to circulating claims on social media, there is a critical vulnerability (exploit) in the protocol’s smart contracts. So far, the project team has not released</p>
<p>The post <a href="https://coinengineer.net/blog/shock-in-the-sui-ecosystem-alleged-vulnerability-in-cetus-protocol-smart-contracts/">Shock in the SUI Ecosystem: Alleged Vulnerability in Cetus Protocol Smart Contracts</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="278" data-end="758">The crypto world has once again been rattled by a security scare. This time, the focus is on <strong data-start="371" data-end="389">Cetus Protocol</strong>, a decentralized exchange protocol operating within the <strong data-start="446" data-end="453">SUI</strong> ecosystem. According to circulating claims on social media, there is a <strong data-start="525" data-end="561">critical vulnerability (exploit)</strong> in the protocol’s <strong data-start="580" data-end="599">smart contracts</strong>. So far, the project team has not released an official statement. However, the rapid spread of the allegations has created a wave of panic across the markets.</p>
<p data-start="760" data-end="1045">Following several technical analyses and on-chain data reports shared on X (formerly Twitter), investor concerns have grown. Independent analysts have pointed to unusual transaction patterns traced to specific wallet addresses, raising suspicions of a potential exploit being underway.</p>
<h2 data-start="1047" data-end="1098">Sharp Price Decline in SUI and CETUS Tokens</h2>
<p data-start="1100" data-end="1419">After the news spread through social platforms, <strong data-start="1148" data-end="1156">$SUI</strong> dropped by <strong data-start="1168" data-end="1176">3.8%</strong>, showing a swift negative response. The most significant impact, however, was seen in <strong data-start="1263" data-end="1272">CETUS</strong>, the token at the heart of the incident. <strong data-start="1314" data-end="1328">Cetus coin</strong> plummeted by approximately <strong data-start="1356" data-end="1363">40%</strong> within the same period, triggering alarm among holders.</p>
<hr />
<p data-start="1421" data-end="1695"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="1421" data-end="1695">This downturn has dealt a blow not only to investor confidence in Cetus, but also to the overall reputation of the <strong data-start="1536" data-end="1543">SUI</strong> network. Trading volumes surged as some investors scrambled to exit positions and shift funds to alternative protocols in an effort to minimize losses.</p>
<p data-start="1421" data-end="1695"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-156583 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/05/cetus.png" alt="cetus" width="1812" height="866" /></p>
<h2 data-start="1697" data-end="1755">Official Statement Pending, All Eyes on Cetus Team</h2>
<p data-start="1757" data-end="2062">All attention is now on the <strong data-start="1785" data-end="1803">Cetus Protocol</strong> team and their pending response. If the alleged exploit is confirmed, it will mark a serious reputational test not just for Cetus but for the broader <strong data-start="1954" data-end="1961">SUI</strong> ecosystem. It may also prompt a renewed focus on smart contract security across other DeFi projects.</p>
<hr />
<p data-start="1757" data-end="2062"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/shock-in-the-sui-ecosystem-alleged-vulnerability-in-cetus-protocol-smart-contracts/">Shock in the SUI Ecosystem: Alleged Vulnerability in Cetus Protocol Smart Contracts</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/shock-in-the-sui-ecosystem-alleged-vulnerability-in-cetus-protocol-smart-contracts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/cetus-2.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/cetus-2.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Ethereum Pectra Update Contains a Critical Vulnerability!</title>
		<link>https://coinengineer.net/blog/ethereum-pectra-update-contains-a-critical-vulnerability/</link>
					<comments>https://coinengineer.net/blog/ethereum-pectra-update-contains-a-critical-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 11 May 2025 16:00:33 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[cross-chain risk]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[crypto wallet]]></category>
		<category><![CDATA[DeFi risk]]></category>
		<category><![CDATA[EIP-7702]]></category>
		<category><![CDATA[eth]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[Ethereum upgrade]]></category>
		<category><![CDATA[hardware wallet]]></category>
		<category><![CDATA[multisig wallet]]></category>
		<category><![CDATA[offchain signature]]></category>
		<category><![CDATA[Pectra]]></category>
		<category><![CDATA[phishing risk]]></category>
		<category><![CDATA[signature delegation]]></category>
		<category><![CDATA[smart contract]]></category>
		<category><![CDATA[wallet security]]></category>
		<category><![CDATA[Web3 threat]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=42132</guid>

					<description><![CDATA[<p>In the fast-paced world of crypto, innovation often walks hand-in-hand with new risks. Ethereum&#8217;s latest upgrade, Pectra, is a double-edged sword — bringing advanced smart wallet features while exposing users to an unprecedented attack vector. One message. That’s all it takes for hackers to drain your entire wallet. A signed offchain message is now powerful</p>
<p>The post <a href="https://coinengineer.net/blog/ethereum-pectra-update-contains-a-critical-vulnerability/">Ethereum Pectra Update Contains a Critical Vulnerability!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="3574" data-end="3821">In the fast-paced world of crypto, innovation often walks hand-in-hand with new risks. Ethereum&#8217;s latest upgrade, <strong data-start="3688" data-end="3698">Pectra</strong>, is a double-edged sword — bringing advanced smart wallet features while exposing users to an unprecedented attack vector.</p>
<p class="" data-start="3823" data-end="4015">One message. That’s all it takes for hackers to drain your entire wallet. A signed offchain message is now powerful enough to hand over control of your funds — no onchain transaction required.</p>
<h2 data-start="4017" data-end="4065">EIP-7702: The Risky New Delegation Mechanism</h2>
<p class="" data-start="4067" data-end="4257">Activated on May 7, 2025, Pectra’s centerpiece <strong data-start="4114" data-end="4126">EIP-7702</strong> introduces a transaction type called SetCode, which allows users to <strong data-start="4195" data-end="4232">delegate control of their wallets</strong> via a simple signature.</p>
<p class="" data-start="4259" data-end="4509"><strong data-start="4259" data-end="4273">Arda Usman</strong>, a Solidity smart contract auditor, confirmed: <em>“An attacker can use this offchain signature to install malicious code into an externally owned account (EOA) and move ETH or tokens — without the user ever signing a transaction.”</em></p>
<p class="" data-start="4511" data-end="4633">This feature effectively transforms user wallets into smart contracts, opening the door to silent yet devastating attacks.</p>
<p data-start="4511" data-end="4633"><img decoding="async" class="aligncenter wp-image-155606 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/05/ethereum-1024x504.webp" alt="ethereum" width="734" height="361" /></p>
<h2 data-start="4635" data-end="4685">A Stealth Threat Via Innocent-Looking Messages</h2>
<p class="" data-start="4687" data-end="4918"><strong data-start="4687" data-end="4705">Yehor Rudytsia</strong>, an onchain researcher at Hacken, emphasized that this transaction type allows arbitrary code to be installed in wallets. Previously, such a change required an actual transaction; now, only a signature is enough.</p>
<hr />
<p data-start="4920" data-end="5136"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="4920" data-end="5136">This shift means phishing attempts, fake DApps, or Discord scams can now result in complete wallet takeovers. <em>“We believe this will become the most common attack vector following the Pectra upgrade,”</em> Rudytsia warned.</p>
<p class="" data-start="5138" data-end="5243">Wallet applications that fail to correctly interpret transaction type <strong data-start="5208" data-end="5216">0x04</strong> are especially vulnerable.</p>
<p data-start="5138" data-end="5243"><img decoding="async" class="aligncenter wp-image-155608 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/05/ethereum-1-1024x728.webp" alt="ethereum" width="739" height="525" /></p>
<h2 data-start="5245" data-end="5288">Hardware Wallets Are Not Immune Anymore</h2>
<p class="" data-start="5290" data-end="5526">The once-clear distinction between hot and cold wallets is fading. Rudytsia highlighted that <strong data-start="5383" data-end="5403">hardware wallets</strong> are now just as vulnerable if users unknowingly sign malicious messages: <em>“Once signed, all funds can be gone in a moment.”</em></p>
<p class="" data-start="5528" data-end="5555">To stay safe, users should:</p>
<ul>
<li data-start="5559" data-end="5608">Never sign messages they do not fully understand.</li>
<li data-start="5611" data-end="5685">Look out for delegation requests, especially those involving nonce values.</li>
<li data-start="5688" data-end="5782">Be aware that some delegation signatures can be replayed on <strong data-start="5748" data-end="5781">any Ethereum-compatible chain</strong>.</li>
</ul>
<p class="" data-start="5784" data-end="5934">While multisig wallets offer more robust protection, single-key wallets — including hardware ones — must adopt new safeguards to prevent exploitation.</p>
<hr />
<p data-start="5784" data-end="5934"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/ethereum-pectra-update-contains-a-critical-vulnerability/">Ethereum Pectra Update Contains a Critical Vulnerability!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/ethereum-pectra-update-contains-a-critical-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/kripto_ce-2-1.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/kripto_ce-2-1.png' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
